Filter by content type
Select one or more filters. This choice will reload the page to display the filtered results.
717 results
-
-
Seminar
-
Cryptography
Complete Addition Formulas for Prime Order Elliptic Curves
Speaker : Joost Renes - University of Nijmegen
An elliptic curve addition law is said to be complete if it correctly computes the sum of any two points in the elliptic curve group. One of the main reasons for the increased popularity of Edwards curves in the ECC community is that they can allow a complete group law that is also relatively efficient (e.g., when compared to all known addition laws on Edwards curves). Such complete addition[…] -
-
-
Seminar
-
Cryptography
Short McEliece key from algebraic geometry codes with automorphism
Speaker : elise barelli - INRIA Saclay
In 1978, McEliece introduced a public key encryption scheme based on linear codes and suggested to use classical Goppa codes, ie: subfield subcodes of algebraic geometric (AG) codes built on a curve of genus 0. This proposition remains secure and in order to have a generalization of classical Goppa codes, in 1996, H. Janwa and O. Moreno suggested to use subfield subcode of AG codes, which we call[…] -
-
-
Seminar
-
Cryptography
Algebraic Decoding of Folded Gabidulin Codes
Speaker : Hannes Bartz - Technische Universität München
Folded Gabidulin codes were proposed by Mahdavifar and Vardy in 2012. Beside the code construction an interpolation-based decoding scheme that can correct rank errors beyond the unique decoding radius for low code rates was presented.<br/> In this talk we present an efficient interpolation-based decoding algorithm for folded Gabidulin codes that can correct rank errors beyond half the minimum rank[…] -
-
-
Seminar
-
Cryptography
Efficient Implementation of Ideal Lattice-Based Cryptography on Embedded Devices
Speaker : Thomas Pöppelmann - Infineon Technologies AG
Novel public-key cryptosystems beyond RSA and ECC are urgently required to ensure long-term security in the era of quantum computing. One alternative to such established schemes is ideal lattice-based cryptography which offers elegant security reductions and versatile cryptographic building blocks such as the ring learning with errors (RLWE) problem. In this talk we will give an overview on[…] -
-
-
Seminar
-
Cryptography
Gröbner Bases Techniques in Post-Quantum Cryptography
Speaker : Ludovic Perret - LIP6
After the publication of Shor's algorithm, it became evident the most popular public-key cryptographic systems that rely on the integer factorization problem or on the discrete logarithm problem would be easily solvable using large enough quantum computers (if such quantum computers are ever built). That triggered a vivid interest in the research of cryptographic algorithms (mostly public-key[…] -
-
-
Seminar
-
Cryptography
Sanitization of FHE Ciphertexts
Speaker : Damien Stehlé - ENS Lyon
By definition, fully homomorphic encryption (FHE) schemes support homomorphic decryption, and all known FHE constructions are bootstrapped from a Somewhat Homomorphic Encryption (SHE) scheme via this technique. Additionally, when a public key is provided, ciphertexts are also re-randomizable, e.g. by adding to them fresh encryptions of~$0$. From those two operations we devise an algorithm to[…] -